Documentation


This topic describes how to chain realms together so that legacy realms (created in the Classic Experience) can use New Experience UI components in the SecureAuth® Identity Platform. 

For example, you want to configure a legacy realm to use FIDO2 authenticators as part of the resource login workflow. Using the New Experience UI, you configure a SAML application with a FIDO2-enabled policy, as a front-end to the legacy realm. 


Front-end configurations

In the Identity Platform New Experience UI, do the following:

  1. Enable the FIDO2 (WebAuthn) global setting
  2. Set up a policy to use FIDO2 as an authenticator in the login workflow.
  3. Create a SAML application to use the policy with FIDO2. 

    1. At minimum, set the following configurations. 

      Connection TypeSet to IdP initiated
      User ID Profile FieldSet to Authenticated User ID
      IdP IssuerSet to a unique name that must match exactly in the legacy realm to identify the Identity Platform as the "Identity Provider" in the SAML Consumer section in the SAML Issuer field. 
      Assertion Consumer Service (ACS)Enter the URL from the service provider of the legacy realm resource to let the application accept a SAML assertion from the Identity Platform. 
      RecipientUse the same URL set in the Assertion Consumer Service (ACS) field. 

    2. Save your changes.
    3. For the SAML application, click the Info for service providers link to get the SAML info you need for the legacy realm.
    4. Copy or download the IdP Signing certificate.
      You'll need this for the legacy realm when adding an identity provider on the Workflow tab in the SAML Consumer section.   


Legacy realm configuration

In the Classic Experience UI, select the legacy realm and do the following: 

  1. Go to the Workflow tab.
  2. In the SAML Consumer section, click Add Identity Provider.
  3. Set the following configurations to add an identity provider. 

    Identity Provider NameSet to friendly name to associate it with the front-end SAML application in the New Experience UI. 
    SAML IssuerSet to the same unique name provided in the IdP Issuer field for the SAML application in the New Experience UI. 
    SAML AudienceLeave blank. 
    SAML ConditionsSelect this check box to use the NotBefore and NotOnOrAfter SAML conditions to create a validity period during which the SAML assertion is valid. 
    IssueInstant Valid Time

    Set to the number of hours from the SAML assertion generation the SAML assertion is valid. 

    This field is not required if the SAML Conditions check box is selected. 

    Clock SkewSet the time in minutes to make up the time difference between the SAML application acting as an front-end identity provider and the legacy realm in the Identity Platform. 
    Signing CertificateCopy and paste the contents from the IdP Signing Certificate in the SAML application set up in the New Experience UI. 

  4. Click Add and Save.
    This adds the front-end SAML application acting as a service provider, and consumes SAML assertions for this legacy realm. 
  5. All settings in the Post Authentication tab stay as defined. 


  • No labels